A security researcher got an eyeful of a sex worker's client base when he investigated a VoIP service whose disposable "burner" phone numbers are being recycled.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Correction. Citing problems in testing, the company has delayed the release of a critical patch for Acrobat and Reader for one week.
Standardized procedure on threat filtering isn't working out so well; to avoid being a 'target' today's organization needs an updated threat strategy.
The iCloud hack has cast Apple in a poor security light. Yes, the company dropped the ball on this one, but it is a leader in many other ways.
These so-called "trusted third-parties" may be the most important tech companies you've never heard of. ZDNet reveals how these companies work as middlemen or "brokers" of customer data between ISPs and phone companies, and the U.S. government.
On Tuesday, about the time that Microsoft issues its Patch Tuesday Windows updates, Adobe will release new versions of Reader and Acrobat.
No data or production systems were compromised. A test server, accidentally open to the Internet, was accessed through a default password.
The XSLCmd backdoor, popular in targeted Windows attacks, has been around for weeks at a minimum and still no anti-malware products detect it.
A total of four updates will be released next Tuesday. One is a critical update for Internet Explorer.
According to new research, employees remain a link in the chain ripe for exploiting, and phishing campaigns are an effective tactic to gain access to corporate networks.